Integrated System Design for Broadcast Program Infringement Detection

Sukmawati Nur Endah, Satriyo Adhy, Sutikno Sutikno


Supervision of television and radio broadcast programs by the “Komisi Penyiaran Indonesia (KPI)” Central Java was still performed manually i.e. direct supervision by humans. It certainly had some weaknesses related to the human error such as tiredness and weary eyes. Therefore, we needed intelligent software that could automatically detect broadcast infringement. Currently, research in this area had not been studied. This research was to design an integrated system to detect broadcast infringement including data design, architecture design and main module interface design. Two main stages in this system are the Indonesian language speech recognition and detection of infringements of the broadcast program. With the method of Mel Frequency cepstral Coefficients (MFCC) and Hidden Markov Model (HMM) speech recognition application that used the 1050 sample data produces about 70% accuracy rate. This research would continue to implement the plan that had been created using speech recognition applications that had been built.


broadcast infringement; infringement detection; Komisi Penyiaran Indonesia (KPI); speech recognition

Full Text:



Sendjaja, S.D. (Chief of Komisi Penyiaran Indonesia Pusat). Regulation of Komisi Penyiaran Indonesia No 02/P/KPI/12/2009 about The Code of Broadcasting Conduct. Jakarta. 2009

Sendjaja, S.D. (Chief of Komisi Penyiaran Indonesia Pusat). Regulation of Komisi Penyiaran Indonesia No 03/P/KPI/12/2009 about The Broadcasting Program Standard. Jakarta. 2009

Jadhav, A., Patil, A. A Smart Texting System for Android Mobile Users, International Journal of Engineering Research and Applications (IJERA). 2012: 2, pp. 1126-1128

Jadhav, A., Patil, A. Android Speech To Text Converter for SMS Application, IOSR Journal of Engineering. 2012:2(3), pp. 420-423

Sharma, F. R and Wasson, S.G. Speech Recognition and Synthetis Tool : Assistive Technology for Physically Disabled Persons, International Journal of Computer Science and Telecommunications. 2012:3, pp 86-91